Vulnerability Assesment

1738 words 7 pages
Pick three locations, events or individuals in your location (county, city or state) and complete a 6 - 8 page assessment of their vulnerabilities and threats, putting their security in order of priority, explaining and defending your choices.

Terrorism vulnerability assessments were created to criticize any “Achilles’ heel” in a security system that can be exploited by anyone willing to do harm to the location, an individual, or coordinated event. It assesses the weaknesses of facilities across a wide range of possible threats or hazards and creates a basis for determining physical and operational improvement measures to assure their protection. It administers both to new construction programming and design and to existing
…show more content…
In order to be prepared the plant should have access to the protected area is restricted to a portion of plant employees and monitored visitors, with stringent access barriers. The vital area is further restricted, with additional barriers and access requirements. The security must comply with Nuclear Regulatory Commission requirements on pre-hiring investigations and training. Once hired, the plant’s security should perform exercises and be trained in defensive strategies against a possible attack, by doing so the security team should know how to protect against the theft of nuclear material, be able to defend against an attack from one or more teams and defend from multiple access points, investigate possible threats from an employee, and lastly have a plan against a vehicle based attack. These exercises should be monitored in order to spot possible areas for improvement, for example the exercises can have an attack team from outside the plant attempting to breach the plant’s vital area and damage key safety mechanism. Security defensive teams participating in the controlled exercises can possibly carry weapons modified to fire paint cartridges or only blanks and laser bursts to simulate bullets, and they wear laser sensors to show hits. Other weapons and explosives, as well as destruction or breaching of physical security barriers, can also be


  • Ancient History: Sparta 98% Assesment Mark
    6395 words | 26 pages
  • Business Administration Level 2 Unit 1 Assesment
    1421 words | 6 pages
  • Signature Assesment
    1058 words | 5 pages
  • IB biology assesment- the effect of heat on vitamin c
    2276 words | 10 pages
  • Cttls Analyse Role of Initial Assesment
    1384 words | 6 pages
  • Vulnerability of Project Management Life Cycle (Pmlc) Model
    1341 words | 6 pages
  • Ryanair: Its Vulnerability and Exposure to the Macroeconomic Environment
    2129 words | 9 pages
  • Identifying Potential Malicious Attacks, Threats, and Vulnerabilities
    1132 words | 5 pages
  • Assesment 3rai Hr1
    1115 words | 5 pages
  • Strengths Finder Assesment
    1585 words | 7 pages